"Sunil Sunder Raj" <[EMAIL PROTECTED]> writes:

> This depends on the shell not ssh configuration. Install rbash and
> assign it to the user having ssh access.

Just remember that "restricted" shells like rbash are not very hard to
break out of, so you can't rely on them as a security measure.  It's a
good way to go if you're mostly trying to avoid confusing the user in
question, or as a protection against shooting yourself in the foot.
[EMAIL PROTECTED] mailing list
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to